{"id":48460,"date":"2021-01-15T22:44:55","date_gmt":"2021-01-15T18:44:55","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=48460"},"modified":"2021-03-10T19:47:37","modified_gmt":"2021-03-10T15:47:37","slug":"news-you-mightve-missed-11-15-jan","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/news-you-mightve-missed-11-15-jan\/","title":{"rendered":"News You Might&#8217;ve Missed.  11 &#8211; 15 Jan"},"content":{"rendered":"<p>What's new this week in the news for MSPs? US warning over cloud services cyberattacks; Babuk Locker new ransomware for 2021; SolarWinds sued over Orion software hack; new Sunspot malware spotted; and Mimecast certificate compromised by hackers. Let's see what it's all about.<!--more--><\/p>\n<h2>US Warning over Cloud Services Cyberattacks<\/h2>\n<p>A warning released this week by the US Department of Homeland Security\u2019s Cybersecurity and Infrastructure Security Agency (CISA) addresses concerns over the recent cyberattacks targeting various cloud services.<\/p>\n<p><a href=\"https:\/\/siliconangle.com\/2021\/01\/13\/us-issues-warning-recent-cyberattacks-targeting-cloud-services\/\"target=\"_blank\" rel=\"noopener noreferrer\">Information in the warning<\/a> says phishing and other modes of attack are in use by the cybercriminals, who exploit poor cybersecurity hygiene within a target\u2019s cloud infrastructure. What\u2019s more, analysts say the attacks seem to have a pattern of occurring when employees are working remotely and using a combination of personal and corporate laptops and devices to access corporate cloud services.<\/p>\n<p>Employees received phishing and fake emails that purported to be official but contained malicious links. Other methods show threat actors taking advantage of forwarding rules to collect private information.<\/p>\n<h2>Babuk Locker New Ransomware for 2021<\/h2>\n<p>Days into the new year, analysts have discovered <a href=\"https:\/\/siliconangle.com\/2021\/01\/05\/babuk-locker-emerges-first-new-form-ransomware-2021\/\"target=\"_blank\" rel=\"noopener noreferrer\">a new form of ransomware<\/a> dubbed Babuk Locker.<br \/>\nThis ransomware has its own implementation of SHA256 encryption, which is being called ChaCha8. It uses Elliptic-curve Diffie-Hellman (ECDH), which encrypts files and protects its keys for key generation.<\/p>\n<p>SHA256 has its origins in the US NSA, and ECDH is maintained through an anonymous key agreement scheme.<\/p>\n<p>According to BleepingComputer, the threat actors behind Babuk Locker now have a list of victims worldwide, and their ransom demands are between $60,000 and $80,000 in bitcoin. The attacks seem customized to the victim and include a hardcoded extension, a Tor victim URL, and a ransom note.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 40%;\"><img decoding=\"async\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/06\/Ransomware-Awareness-Poster-Pack-2.png\" alt=\"Poster Pack\" \/><\/div>\n<div class=\"call-to-action__right\" style=\"width: 60%;\">\n<div class=\"call-to-action__title\">MSP's Ransomware Awareness Poster Pack<\/div>\n<div class=\"call-to-action__text\">\n<p>4 white-label posters to help you educate your end-users on how not to get hit by ransomware.<\/p>\n<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-38530902-54cb-489c-9f02-772612f0072d\" data-portal=\"5442029\" data-id=\"38530902-54cb-489c-9f02-772612f0072d\"><span class=\"hs-cta-node hs-cta-38530902-54cb-489c-9f02-772612f0072d\" id=\"hs-cta-38530902-54cb-489c-9f02-772612f0072d\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/38530902-54cb-489c-9f02-772612f0072d\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-38530902-54cb-489c-9f02-772612f0072d\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/38530902-54cb-489c-9f02-772612f0072d.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<\/div>\n<h2>SolarWinds Sued over Orion Software Hack<\/h2>\n<p id=\"last\">Shareholders of the US government software provider SolarWinds Worldwide LLC are suing the company following the news in December that its Orion software was hacked. The lawsuit documents say that the former President, the Chief Executive Officer Kevin Thompson, and the Chief Financial Officer Barton Kalsu made \u201cfalse and\/or misleading\u201d statements in February, May, August, and November during regulatory filings with the US Securities and Exchange Commission.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-eb8a7046-2e03-421f-8d52-d19a9a82d447\" data-portal=\"5442029\" data-id=\"eb8a7046-2e03-421f-8d52-d19a9a82d447\"><span class=\"hs-cta-node hs-cta-eb8a7046-2e03-421f-8d52-d19a9a82d447\" id=\"hs-cta-eb8a7046-2e03-421f-8d52-d19a9a82d447\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/eb8a7046-2e03-421f-8d52-d19a9a82d447\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-eb8a7046-2e03-421f-8d52-d19a9a82d447\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/eb8a7046-2e03-421f-8d52-d19a9a82d447.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>Timothy Bremer, a shareholder of the company who bought shares in September and October, filed the suit. The extent of the hack may be greater than initially suggested, according to a <a href=\"https:\/\/siliconangle.com\/2021\/01\/03\/solarwinds-hack-claimed-bigger-previously-believed\/\"target=\"_blank\" rel=\"noopener noreferrer\">report published on January 3rd<\/a>.<\/p>\n<h2>New Sunspot Malware Spotted<\/h2>\n<p>During the investigation into the SolarWinds hack, cybersecurity firm CrowdStrike discovered the malware used to inject backdoors into the Orion platform. The cybercriminals <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-sunspot-malware-found-while-investigating-solarwinds-hack\/\"target=\"_blank\" rel=\"noopener noreferrer\">dropped the malware, called Sunspot<\/a> by CrowdStrike, into the development environment of SolarWinds\u2019 Orion IT management software.<\/p>\n<p>The malware would monitor and automatically inject a Sunburst backdoor that would replace Orion\u2019s original source code with malicious code. The hackers\u2019 method was devised to avoid detection by the software developers and build teams.<\/p>\n<p>Since the investigation into the hacking began, this is the third strain of malware that has been found.<\/p>\n<p>Last week, CISA, the FBI, and the NSA issued a joint statement in which they stated that the Russian-backed Advanced Persistent Threat (APT) group was likely behind the attack. However, to date they haven\u2019t been able to verify the individual attackers.<\/p>\n<h2>Mimecast Certificate Compromised by Hackers<\/h2>\n<p>A hacker has compromised a security certificate issued to Mimecast customers to authenticate them for some of its products with Microsoft 365 Exchange Web Services. It was the <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/mimecast-cert-compromised-target\/\"target=\"_blank\" rel=\"noopener noreferrer\">target of a sophisticated cybercriminal<\/a>, and about 10% of its customers use the certificate. However, it notes that only a small number of Microsoft 365 users were the hacker\u2019s target.<\/p>\n<p>Saryu Nayyar, chief executive officer of Gurucul Solutions Pvt Ltd. A.G., believes the hackers are the same group who breached SolarWinds and multiple government agencies. He says, \u201cThis shows the skill and tenacity state and state-sponsored actors can bring to bear when they are pursuing their agenda. Against this sort of opponent, civilian organizations will need to up their game if they don\u2019t want to become the next headline.\u201d<\/p>\n<h2>That's a Wrap for News You Might've Missed<\/h2>\n<p>I hope this update has been helpful. MSP360 is your resource for MSP news. Stay home, stay safe and healthy, and remember to check back every week for more highlights.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What&#8217;s new this week in the news for MSPs? US warning over cloud services cyberattacks; Babuk Locker new ransomware for 2021; SolarWinds sued over Orion software hack; new Sunspot malware spotted; and Mimecast certificate compromised by hackers. Let&#8217;s see what it&#8217;s all about.<\/p>\n","protected":false},"author":84,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,885],"tags":[],"class_list":["post-48460","post","type-post","status-publish","format-standard","hentry","category-blog-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/48460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=48460"}],"version-history":[{"count":0,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/48460\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=48460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=48460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=48460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}